Item Search

NameAudit NamePluginCategory
1.1.1.8 Ensure mounting of FAT filesystems is limited - lsmodCIS Distribution Independent Linux Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

1.1.1.8 Ensure mounting of FAT filesystems is limited - lsmodCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

1.1.1.8 Ensure mounting of FAT filesystems is limited - modprobeCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

1.2.1 Ensure AIDE is installedCIS Debian 10 Workstation L1 v2.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

1.3 Ensure Apache Is Installed From the Appropriate BinariesCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

CONFIGURATION MANAGEMENT

1.3.2 Ensure filesystem integrity is regularly checkedCIS Aliyun Linux 2 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

1.3.2 Ensure filesystem integrity is regularly checkedCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.4 Ensure latest version of Cassandra is installedCIS Apache Cassandra 3.11 L1 Unix Audit v1.0.0Unix

SYSTEM AND SERVICES ACQUISITION

1.4.1 Ensure AIDE is installed - aideCIS Debian Family Workstation L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

1.4.1 Ensure AIDE is installed - aide-commonCIS Debian Family Server L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

1.4.1 Ensure AIDE is installed - aide-commonCIS Debian Family Workstation L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

1.5.2 Ensure XD/NX support is enabledCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.5.2 Ensure XD/NX support is enabledCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.5.2 Ensure XD/NX support is enabledCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

1.6.1 Ensure XD/NX support is enabledCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.6.2 Ensure XD/NX support is enabledCIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

3.2.1.14 Ensure 'Allow installing configuration profiles' is set to 'Disabled'MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.15 Ensure 'Allow installing configuration profiles' is set to 'Disabled'MobileIron - CIS Apple iPadOS 17 Institutionally Owned L1MDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.1.15 Ensure 'Allow installing configuration profiles' is set to 'Disabled'MobileIron - CIS Apple iPadOS 18 v1.0.0 L1 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.1.15 Ensure 'Allow installing configuration profiles' is set to 'Disabled'AirWatch - CIS Apple iPadOS 17 Institutionally Owned L1MDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

ACCESS CONTROL

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2014 Database L1 AWS RDS v1.5.0MS_SQLDB

ACCESS CONTROL

4.2 Ensure Example or Test Databases are Not Installed on Production ServersCIS MariaDB 10.6 Database L1 v1.1.0MySQLDB

PLANNING, SYSTEM AND SERVICES ACQUISITION

6.1.1 Ensure AIDE is installedCIS Debian Linux 11 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

8.3.11 Set 'Allow installation of desktop items' to 'Enabled:Disable'CIS IE 10 v1.1.0Windows

CONFIGURATION MANAGEMENT

18.8.7.2 Ensure 'Allow remote access to the Plug and Play interface' is set to 'Disabled'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL

18.10.92.1.1 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'CIS Microsoft Windows Server 2016 v3.0.0 L1 MSWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.92.1.1 Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'CIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Member ServerWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.1.1 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'CIS Windows Server 2012 DC L1 v3.0.0Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.1.1 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'CIS Windows Server 2012 MS L1 v3.0.0Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.1.1 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.1.1 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'CIS Microsoft Windows Server 2022 v4.0.0 L1 DCWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.1.1 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.1.1 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.1.1 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'CIS Microsoft Windows Server 2019 Stand-alone v3.0.0 L1 MSWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.10.93.1.1 (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'CIS Microsoft Windows Server 2019 v4.0.0 L1 DCWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

APPNET0046 - The Trust Providers Software Publishing State must be set to 0x23C00.DISA STIG for Microsoft Dot Net Framework 4.0 v2r6Windows

IDENTIFICATION AND AUTHENTICATION

OL08-00-040300 - The OL 8 file integrity tool must be configured to verify extended attributes.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

PANW-AG-000036 - The Palo Alto Networks security platform must disable WMI probing if it is not used.DISA STIG Palo Alto ALG v3r4Palo_Alto

CONFIGURATION MANAGEMENT

RHEL-08-040300 - The RHEL 8 file integrity tool must be configured to verify extended attributes.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

SPLK-CL-000260 - The System Administrator (SA) and Information System Security Officer (ISSO) must configure the retention of the log records based on the defined security plan.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

AUDIT AND ACCOUNTABILITY

SQL2-00-015400 - SQL Server software installation account(s) must be restricted to authorized users.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

CONFIGURATION MANAGEMENT

System settings: Use Certificate Rules on Windows Executables for Software Restriction PoliciesMSCT Windows Server 2012 R2 DC v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

System settings: Use Certificate Rules on Windows Executables for Software Restriction PoliciesMSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

VCPF-67-000026 - Performance Charts must properly configure log sizes and rotation - MaxBackupIndexDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3Unix

AUDIT AND ACCOUNTABILITY

VCPF-70-000029 - Performance Charts must properly configure log sizes and rotation.DISA STIG VMware vSphere 7.0 Perfcharts Tomcat v1r1Unix

AUDIT AND ACCOUNTABILITY

VCSA-70-000267 - The vCenter Server must disable the distributed virtual switch health check.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

WN12-00-000180 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client - LanManWorkstationDISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN12-00-000180 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client - mrxsmb10DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

CONFIGURATION MANAGEMENT